亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲(chóng)蟲(chóng)下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲(chóng)蟲(chóng)下載站

?? rpc.rfc.ms

?? RTEMS (Real-Time Executive for Multiprocessor Systems) is a free open source real-time operating sys
?? MS
?? 第 1 頁(yè) / 共 3 頁(yè)
字號(hào):
.\".\" Must use  --  tbl  --  with this one.\".\" @(#)rpc.rfc.ms	2.2 88/08/05 4.0 RPCSRC.de BT.if \\n%=1 .tl ''- % -''...ND.\" prevent excess underlining in nroff.if n .fp 2 R.OH 'Remote Procedure Calls: Protocol Specification''Page %'.EH 'Page %''Remote Procedure Calls: Protocol Specification'.if \\n%=1 .bp.SH\&Remote Procedure Calls: Protocol Specification.LP.NH 0\&Status of this Memo.LPNote: This chapter specifies a protocol that Sun Microsystems, Inc.,and others are using.  It has been designated RFC1050 by the ARPA NetworkInformation Center..LP.NH 1\&Introduction.LPThis chapter specifies  a  message protocol  used in implementingSun's Remote Procedure Call (RPC) package.  (The message protocol isspecified with the External Data Representation (XDR) language.See the.I "External Data Representation Standard: Protocol Specification"for the details.  Here, we assume that  the  reader is familiar  with XDR and do not attempt to justify it or its uses).  The paperby Birrell and Nelson [1]  is recommended as an  excellent backgroundto  and justification of RPC..NH 2\&Terminology.LPThis chapter discusses servers, services, programs, procedures,clients, and versions.  A server is a piece of software where networkservices are implemented.  A network service is a collection of oneor more remote programs.  A remote program implements one or moreremote procedures; the procedures, their parameters, and results aredocumented in the specific program's protocol specification (see the\fIPort Mapper Program Protocol\fP\, below, for an example).  Networkclients are pieces of software that initiate remote procedure callsto services.  A server may support more than one version of a remoteprogram in order to be forward compatible with changing protocols..LPFor example, a network file service may be composed of two programs.One program may deal with high-level applications such as file systemaccess control and locking.  The other may deal with low-level fileIO and have procedures like "read" and "write".  A client machine ofthe network file service would call the procedures associated withthe two programs of the service on behalf of some user on the clientmachine..NH 2\&The RPC Model.LPThe remote procedure call model is similar to the local procedurecall model.  In the local case, the caller places arguments to aprocedure in some well-specified location (such as a resultregister).  It then transfers control to the procedure, andeventually gains back control.  At that point, the results of theprocedure are extracted from the well-specified location, and thecaller continues execution..LPThe remote procedure call is similar, in that one thread of controllogically winds through two processes\(emone is the caller's process,the other is a server's process.  That is, the caller process sends acall message to the server process and waits (blocks) for a replymessage.  The call message contains the procedure's parameters, amongother things.  The reply message contains the procedure's results,among other things.  Once the reply message is received, the resultsof the procedure are extracted, and caller's execution is resumed..LPOn the server side, a process is dormant awaiting the arrival of acall message.  When one arrives, the server process extracts theprocedure's parameters, computes the results, sends a reply message,and then awaits the next call message..LPNote that in this model, only one of the two processes is active atany given time.  However, this model is only given as an example.The RPC protocol makes no restrictions on the concurrency modelimplemented, and others are possible.  For example, an implementationmay choose to have RPC calls be asynchronous, so that the client maydo useful work while waiting for the reply from the server.  Anotherpossibility is to have the server create a task to process anincoming request, so that the server can be free to receive otherrequests..NH 2\&Transports and Semantics.LPThe RPC protocol is independent of transport protocols.  That is, RPCdoes not care how a message is passed from one process to another.The protocol deals only with specification and interpretation ofmessages..LPIt is important to point out that RPC does not try to implement anykind of reliability and that the application must be aware of thetype of transport protocol underneath RPC.  If it knows it is runningon top of a reliable transport such as TCP/IP[6], then most of thework is already done for it.  On the other hand, if it is running ontop of an unreliable transport such as UDP/IP[7], it must implementis own retransmission and time-out policy as the RPC layer does notprovide this service..LPBecause of transport independence, the RPC protocol does not attachspecific semantics to the remote procedures or their execution.Semantics can be inferred from (but should be explicitly specifiedby) the underlying transport protocol.  For example, consider RPCrunning on top of an unreliable transport such as UDP/IP.  If anapplication retransmits RPC messages after short time-outs, the onlything it can infer if it receives no reply is that the procedure wasexecuted zero or more times.  If it does receive a reply, then it caninfer that the procedure was executed at least once..LPA server may wish to remember previously granted requests from aclient and not regrant them in order to insure some degree ofexecute-at-most-once semantics.  A server can do this by takingadvantage of the transaction ID that is packaged with every RPCrequest.  The main use of this transaction is by the client RPC layerin matching replies to requests.  However, a client application maychoose to reuse its previous transaction ID when retransmitting arequest.  The server application, knowing this fact, may choose toremember this ID after granting a request and not regrant requestswith the same ID in order to achieve some degree ofexecute-at-most-once semantics.  The server is not allowed to examinethis ID in any other way except as a test for equality..LPOn the other hand, if using a reliable transport such as TCP/IP, theapplication can infer from a reply message that the procedure wasexecuted exactly once, but if it receives no reply message, it cannotassume the remote procedure was not executed.  Note that even if aconnection-oriented protocol like TCP is used, an application stillneeds time-outs and reconnection to handle server crashes..LPThere are other possibilities for transports besides datagram- orconnection-oriented protocols.  For example, a request-reply protocolsuch as VMTP[2] is perhaps the most natural transport for RPC..SH.INOTE:  At Sun, RPC is currently implemented on top of both TCP/IPand UDP/IP transports..LP.NH 2\&Binding and Rendezvous Independence.LPThe act of binding a client to a service is NOT part of the remoteprocedure call specification.  This important and necessary functionis left up to some higher-level software.  (The software may use RPCitself\(emsee the \fIPort Mapper Program Protocol\fP\, below)..LPImplementors should think of the RPC protocol as the jump-subroutineinstruction ("JSR") of a network; the loader (binder) makes JSRuseful, and the loader itself uses JSR to accomplish its task.Likewise, the network makes RPC useful, using RPC to accomplish thistask..NH 2\&Authentication.LPThe RPC protocol provides the fields necessary for a client toidentify itself to a service and vice-versa.  Security and accesscontrol mechanisms can be built on top of the message authentication.Several different authentication protocols can be supported.  A fieldin the RPC header indicates which protocol is being used.  Moreinformation on specific authentication protocols can be found in the\fIAuthentication Protocols\fP\,below..KS.NH 1\&RPC Protocol Requirements.LPThe RPC protocol must provide for the following:.IP  1.Unique specification of a procedure to be called..IP  2.Provisions for matching response messages to request messages..KE.IP  3.Provisions for authenticating the caller to service and vice-versa..LPBesides these requirements, features that detect the following areworth supporting because of protocol roll-over errors, implementationbugs, user error, and network administration:.IP  1.RPC protocol mismatches..IP  2.Remote program protocol version mismatches..IP  3.Protocol errors (such as misspecification of a procedure's parameters)..IP  4.Reasons why remote authentication failed..IP  5.Any other reasons why the desired procedure was not called..NH 2\&Programs and Procedures.LPThe RPC call message has three unsigned fields:  remote programnumber, remote program version number, and remote procedure number.The three fields uniquely identify the procedure to be called.Program numbers are administered by some central authority (likeSun).  Once an implementor has a program number, he can implement hisremote program; the first implementation would most likely have theversion number of 1.  Because most new protocols evolve into better,stable, and mature protocols, a version field of the call messageidentifies which version of the protocol the caller is using.Version numbers make speaking old and new protocols through the sameserver process possible..LPThe procedure number identifies the procedure to be called.  Thesenumbers are documented in the specific program's protocolspecification.  For example, a file service's protocol specificationmay state that its procedure number 5 is "read" and procedure number12 is "write"..LPJust as remote program protocols may change over several versions,the actual RPC message protocol could also change.  Therefore, thecall message also has in it the RPC version number, which is alwaysequal to two for the version of RPC described here..LPThe reply message to a request  message  has enough  information todistinguish the following error conditions:.IP  1.The remote implementation of RPC does speak protocol version 2.The lowest and highest supported RPC version numbers are returned..IP  2.The remote program is not available on the remote system..IP  3.The remote program does not support the requested version number.The lowest and highest supported remote program version numbers arereturned..IP  4.The requested procedure number does not exist.  (This is usually acaller side protocol or programming error.).IP  5.The parameters to the remote procedure appear to be garbage from theserver's point of view.  (Again, this is usually caused by adisagreement about the protocol between client and service.).NH 2\&Authentication.LPProvisions for authentication of caller to service and vice-versa areprovided as a part of the RPC protocol.  The call message has twoauthentication fields, the credentials and verifier.  The replymessage has one authentication field, the response verifier.  The RPCprotocol specification defines all three fields to be the followingopaque type:.DS.ft CW.vs 11enum auth_flavor {    AUTH_NULL        = 0,    AUTH_UNIX        = 1,    AUTH_SHORT       = 2,    AUTH_DES         = 3    /* \fIand more to be defined\fP */};struct opaque_auth {    auth_flavor flavor;    opaque body<400>;};.DE.LPIn simple English, any.I opaque_auth structure is an .I auth_flavor enumeration followed by bytes which are  opaque to the RPC protocolimplementation..LPThe interpretation and semantics  of the data contained  within theauthentication   fields  is specified  by  individual,  independentauthentication  protocol specifications.   (See \fIAuthentication Protocols\fP\,below, for definitions of the various authentication protocols.).LPIf authentication parameters were   rejected, the  response messagecontains information stating why they were rejected..NH 2\&Program Number Assignment.LPProgram numbers are given out in groups of.I 0x20000000 (decimal 536870912) according to the following chart:.TSbox tab (&) ;lfI lfIrfL cfI .Program Numbers&Description_.sp .50 - 1fffffff&Defined by Sun20000000 - 3fffffff&Defined by user40000000 - 5fffffff&Transient60000000 - 7fffffff&Reserved80000000 - 9fffffff&Reserveda0000000 - bfffffff&Reservedc0000000 - dfffffff&Reservede0000000 - ffffffff&Reserved.TE.LPThe first group is a range of numbers administered by SunMicrosystems and should be identical for all sites.  The second rangeis for applications peculiar to a particular site.  This range isintended primarily for debugging new programs.  When a site developsan application that might be of general interest, that applicationshould be given an assigned number in the first range.  The thirdgroup is for applications that generate program numbers dynamically.The final groups are reserved for future use, and should not be used..NH 2\&Other Uses of the RPC Protocol.LPThe intended use of this protocol is for calling remote procedures.That is, each call message is matched with a response message.However, the protocol itself is a message-passing protocol with whichother (non-RPC) protocols can be implemented.  Sun currently uses, orperhaps abuses, the RPC message protocol for the following two(non-RPC) protocols:  batching (or pipelining) and broadcast RPC.These two protocols are discussed but not defined below..NH 3\&Batching.LPBatching allows a client to send an arbitrarily large sequence ofcall messages to a server; batching typically uses reliable bytestream protocols (like TCP/IP) for its transport.  In the case ofbatching, the client never waits for a reply from the server, and theserver does not send replies to batch requests.  A sequence of batchcalls is usually terminated by a legitimate RPC in order to flush thepipeline (with positive acknowledgement)..NH 3\&Broadcast RPC.LPIn broadcast RPC-based protocols, the client sends a broadcast packetto the network and waits for numerous replies.  Broadcast RPC usesunreliable, packet-based protocols (like UDP/IP) as its transports.Servers that support broadcast protocols only respond when therequest is successfully processed, and are silent in the face oferrors.  Broadcast RPC uses the Port Mapper RPC service to achieveits semantics.  See the \fIPort Mapper Program Protocol\fP\, below,for more information..KS.NH 1\&The RPC Message Protocol.LPThis section defines the RPC message protocol in the XDR datadescription language.  The message is defined in a top-down style..ie t .DS.el .DS L.ft CWenum msg_type {	CALL  = 0,	REPLY = 1};.ft I/** A reply to a call message can take on two forms:* The message was either accepted or rejected.*/.ft CWenum reply_stat {	MSG_ACCEPTED = 0,	MSG_DENIED   = 1};.ft I/** Given that a call message was accepted,  the following is the* status of an attempt to call a remote procedure.*/.ft CWenum accept_stat {	SUCCESS       = 0, /* \fIRPC executed successfully       \fP*/	PROG_UNAVAIL  = 1, /* \fIremote hasn't exported program  \fP*/	PROG_MISMATCH = 2, /* \fIremote can't support version #  \fP*/	PROC_UNAVAIL  = 3, /* \fIprogram can't support procedure \fP*/	GARBAGE_ARGS  = 4  /* \fIprocedure can't decode params   \fP*/};.DE.ie t .DS.el .DS L.ft I/** Reasons why a call message was rejected:*/.ft CWenum reject_stat {	RPC_MISMATCH = 0, /* \fIRPC version number != 2          \fP*/	AUTH_ERROR = 1    /* \fIremote can't authenticate caller \fP*/};.ft I/** Why authentication failed:*/.ft CWenum auth_stat {	AUTH_BADCRED      = 1,  /* \fIbad credentials \fP*/	AUTH_REJECTEDCRED = 2,  /* \fIclient must begin new session \fP*/	AUTH_BADVERF      = 3,  /* \fIbad verifier \fP*/	AUTH_REJECTEDVERF = 4,  /* \fIverifier expired or replayed  \fP*/	AUTH_TOOWEAK      = 5   /* \fIrejected for security reasons \fP*/};.DE.KE.ie t .DS.el .DS L.ft I/** The  RPC  message: * All   messages  start with   a transaction  identifier,  xid,* followed  by a  two-armed  discriminated union.   The union's* discriminant is a  msg_type which switches to  one of the two* types   of the message.   The xid  of a \fIREPLY\fP  message always* matches  that of the initiating \fICALL\fP   message.   NB: The xid* field is only  used for clients  matching reply messages with* call messages  or for servers detecting  retransmissions; the* service side  cannot treat this id  as any type   of sequence* number.*/.ft CWstruct rpc_msg {	unsigned int xid;	union switch (msg_type mtype) {		case CALL:			call_body cbody;		case REPLY:  			reply_body rbody;	} body;};.DE.ie t .DS

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
av一二三不卡影片| 亚洲国产精品二十页| 欧美日韩亚洲综合| 色猫猫国产区一区二在线视频| 洋洋成人永久网站入口| 久久色在线视频| 欧美不卡在线视频| 精品蜜桃在线看| 欧美日韩国产综合草草| 欧美三级在线播放| 欧美日韩高清在线播放| 欧美日韩国产综合一区二区| 欧美日本高清视频在线观看| 9191成人精品久久| 欧美电视剧在线观看完整版| 日韩写真欧美这视频| www成人在线观看| 国产欧美日韩激情| 国产精品午夜电影| 日韩伦理免费电影| 亚洲午夜一区二区| 蜜臀久久久久久久| 国内精品视频666| 风间由美中文字幕在线看视频国产欧美 | 五月天激情综合| 亚洲成人第一页| 日韩福利电影在线观看| 韩国精品一区二区| av亚洲产国偷v产偷v自拍| 色婷婷国产精品综合在线观看| 久久狠狠亚洲综合| 懂色av一区二区三区免费看| 97国产一区二区| 欧美日韩日日摸| 精品久久久久久最新网址| 久久免费的精品国产v∧| 国产精品少妇自拍| 亚洲综合色自拍一区| 久久精品国产久精国产| 成人a免费在线看| 欧美性大战xxxxx久久久| 精品国产一区二区三区四区四| 欧美丰满嫩嫩电影| 2023国产精品视频| 一区二区三区欧美激情| 久久精品国产亚洲a| 高清不卡在线观看av| 欧美丝袜自拍制服另类| 2023国产精品视频| 亚洲一级二级三级在线免费观看| 欧美韩国日本综合| 亚洲成人动漫在线观看| 国产经典欧美精品| 欧美日韩极品在线观看一区| 欧美激情一区在线观看| 亚洲综合一二区| 国产精品综合在线视频| 欧美日韩一区不卡| 国产亚洲综合在线| 婷婷久久综合九色综合绿巨人 | 亚洲电影中文字幕在线观看| 日韩欧美一区二区在线视频| 久久久精品日韩欧美| 一区二区激情小说| 国产精品亚洲一区二区三区在线| 国产在线不卡一区| 欧美日韩国产123区| 国产精品家庭影院| 国产一区二区三区在线看麻豆| 老司机午夜精品| 99精品视频中文字幕| 精品人在线二区三区| 一区二区三区在线视频免费观看| 亚洲最大成人综合| 国产成人精品亚洲日本在线桃色| 国产美女娇喘av呻吟久久| 在线观看亚洲a| 欧美国产精品专区| 精品一区精品二区高清| 欧美精品xxxxbbbb| 一区二区三国产精华液| 成人免费看的视频| 久久久久久免费| 麻豆精品一二三| 在线成人高清不卡| 一区二区三区在线观看国产| 成人激情免费视频| 久久久777精品电影网影网| 麻豆精品国产91久久久久久| 欧美日韩免费电影| 一区二区三区日韩欧美| 91理论电影在线观看| 国产精品久久久久影院老司| 国产毛片精品视频| 2019国产精品| 国产在线精品一区二区不卡了| 暴力调教一区二区三区| 国产亚洲一区字幕| 精品制服美女丁香| 精品欧美久久久| 久久99精品视频| 精品日韩一区二区三区| 久久精品av麻豆的观看方式| 欧美成人女星排名| 久久99国产精品成人| 日韩欧美电影一二三| 美腿丝袜一区二区三区| 日韩精品一区二区三区在线播放 | 国产一区二区不卡在线| 久久亚洲综合色一区二区三区 | 美女诱惑一区二区| 日韩欧美的一区| 久久精品国产99久久6| 日韩欧美自拍偷拍| 国产在线播放一区二区三区| 久久精品免费在线观看| 国产乱码精品1区2区3区| 国产欧美精品一区aⅴ影院| 成人污污视频在线观看| 日韩美女精品在线| 日本高清不卡视频| 亚洲一区二区三区三| 欧美群妇大交群中文字幕| 视频一区欧美精品| 欧美成人一区二区三区在线观看 | 国内不卡的二区三区中文字幕| 99精品国产视频| 91视频免费看| 婷婷综合五月天| 欧美xxxxxxxxx| 成人av动漫在线| 午夜精品久久久久久久99樱桃| 成人午夜又粗又硬又大| 亚洲男女一区二区三区| 欧美日韩免费高清一区色橹橹| 国产精品女主播av| 欧美性高清videossexo| 美女一区二区在线观看| 国产女人aaa级久久久级| 91国偷自产一区二区开放时间| 久久在线免费观看| 97久久精品人人澡人人爽| 亚洲午夜精品网| 精品国产污网站| 一本到三区不卡视频| 日本va欧美va精品发布| 国产免费久久精品| 欧美日韩小视频| 国产久卡久卡久卡久卡视频精品| 日韩免费看的电影| av一二三不卡影片| 天天亚洲美女在线视频| 久久精品亚洲国产奇米99| 91丨porny丨国产入口| 精品综合免费视频观看| 亚洲日本va午夜在线影院| 日韩一区二区三区电影在线观看| 亚洲一区二区在线免费观看视频| 91麻豆免费观看| 蜜臀99久久精品久久久久久软件| 777午夜精品视频在线播放| 国产成人综合亚洲91猫咪| 亚洲一本大道在线| 精品国产免费人成电影在线观看四季| 欧美aaaaa成人免费观看视频| 777a∨成人精品桃花网| 成人app下载| 麻豆精品在线观看| 一区二区三区色| 国产婷婷色一区二区三区| 欧美视频一二三区| 岛国av在线一区| 麻豆精品一区二区av白丝在线| 精品少妇一区二区三区在线视频| 美腿丝袜亚洲一区| 亚洲在线中文字幕| 国产精品美女久久久久高潮| 日韩精品一区二区在线| 欧美日韩一卡二卡三卡 | 视频一区二区中文字幕| 亚洲日本在线看| 欧美国产97人人爽人人喊| 欧美一二三区精品| 欧美午夜精品电影| kk眼镜猥琐国模调教系列一区二区| 一区二区中文视频| 久久久www免费人成精品| 欧美精品xxxxbbbb| 91老师片黄在线观看| 成人精品视频一区| 国产一区二区三区在线观看免费 | 欧美中文字幕不卡| 成人国产精品免费观看视频| 裸体一区二区三区| 亚洲国产精品久久人人爱| 色av一区二区| 国产成人免费视频| 国产精选一区二区三区| 国产一区二区三区av电影| 久久66热re国产|